


default search action
2. ICISC 1999: Seoul, Korea
- JooSeok Song:

Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings. Lecture Notes in Computer Science 1787, Springer 2000, ISBN 3-540-67380-6
Invited Talk
- Serge Vaudenay:

On Probable Security for Conventional Cryptography. 1-16
Cryptanalysis and Cryptographic Design
- Miia Hermelin, Kaisa Nyberg:

Correlation Properties of the Bluetooth Combiner Generator. 17-29 - DaeHun Nyang, JooSeok Song:

Preventing Double-Spent Coins from Revealing User's Whole Secret. 30-37 - Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim:

On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. 38-52 - William D. Banks

, Frances Griffin, Daniel Lieman, Igor E. Shparlinski
:
Non-linear Complexity of the Naor-Reingold Pseudo-random Function. 53-59
Cryptographic Theory and Computation Complexity
- Yuliang Zheng

, Xian-Mo Zhang:
Relationships between Bent Functions and Complementary Plateaued Functions. 60-75 - Takeshi Koshiba

:
A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions. 76-81 - Yasuyuki Sakai:

Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems. 82-101 - Chae Hoon Lim, Hyo Sun Hwang:

Speeding Up Elliptic Scalar Multiplication with Precomputation. 102-119
Cryptographic Protocol and Authentication Design
- Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng

:
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. 120-131 - Kapali Viswanathan, Colin Boyd, Ed Dawson

:
Secure Selection Protocols. 132-146 - Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang:

Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. 147-155 - Kook-Heui Lee, Sang-Jae Moon, Won-Young Jeong, Tae-Geun Kim:

A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications. 156-168
Digital Signature and Secret Sharing Scheme
- Josef Pieprzyk

, Eiji Okamoto:
Verfiable Secret Sharing and Time Capsules. 169-183 - Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam:

A New Approach to Robust Threshold RSA Signature Schemes. 184-196 - Shingo Miyazaki, Kouichi Sakurai, Moti Yung:

On Threshold RSA-Signing with no Dealer. 197-207 - Ho-Sun Yoon, Heung Youl Youm:

A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature. 208-220
Electronic Cash, Application, Implementation
- Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto:

A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. 221-235 - Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum:

A Security Design for a Wide-Area Distributed System. 236-256 - Pascal Paillier, Moti Yung:

Self-Escrowed Public-Key Infrastructures. 257-268 - Moonseog Seo, Kwangjo Kim:

Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. 269-277

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














